Static task
static1
Behavioral task
behavioral1
Sample
124a1095e4e2f592d921b946a5a022a1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
124a1095e4e2f592d921b946a5a022a1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
124a1095e4e2f592d921b946a5a022a1_JaffaCakes118
-
Size
120KB
-
MD5
124a1095e4e2f592d921b946a5a022a1
-
SHA1
27997730b6d4b8d1e033e5d390542ce7260d813a
-
SHA256
b08f21a3e2439a594b6696d63033157f04bad4836847440cb5d3b9dbb5afee2e
-
SHA512
19a4c60ae38c67cb68a29932001e9805b1931b912d93542d0cabd4a2692bb2e1bcee8708a78f5704427fd6e01ff496ea7102cf4f0d3ef49faa603f1039471c3c
-
SSDEEP
3072:9CXxLG0eIKu5EaBomawJi096+bocEXbVzoMa12g:qIlmd9BolZ5a19
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 124a1095e4e2f592d921b946a5a022a1_JaffaCakes118
Files
-
124a1095e4e2f592d921b946a5a022a1_JaffaCakes118.exe windows:4 windows x86 arch:x86
ce9bf2f6f70dd584216347739daec9eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
LockResource
GlobalLock
GlobalAlloc
LoadResource
SizeofResource
FindResourceA
CreateDirectoryA
FindFirstFileA
MoveFileA
CreateThread
TerminateThread
ResumeThread
SuspendThread
GetVersionExA
FindClose
FindNextFileA
SetEndOfFile
LoadLibraryA
SetEnvironmentVariableA
GetOEMCP
GetACP
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
MultiByteToWideChar
GlobalUnlock
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
WideCharToMultiByte
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
HeapSize
TerminateProcess
GetProcAddress
SetFilePointer
GlobalFree
CreateFileA
GetFileSize
CloseHandle
lstrcpynA
OutputDebugStringA
DebugBreak
lstrlenA
GetTempPathA
GetTempFileNameA
GetModuleFileNameA
CopyFileA
Sleep
CreateProcessA
DeleteFileA
InterlockedDecrement
GetFileType
GetStdHandle
SetHandleCount
GetLastError
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
ReadFile
WriteFile
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapAlloc
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
HeapFree
InterlockedIncrement
GetCPInfo
user32
SetWindowLongA
SetFocus
ShowWindow
GetDlgItem
SetWindowTextA
SendMessageA
DestroyWindow
GetSystemMetrics
SetWindowPos
MapWindowPoints
DefWindowProcA
GetActiveWindow
GetClientRect
SystemParametersInfoA
GetWindowRect
GetWindow
DialogBoxParamA
LoadImageA
GetParent
GetWindowLongA
wvsprintfA
ClientToScreen
AdjustWindowRectEx
MoveWindow
GetDlgCtrlID
EnableWindow
GetWindowTextA
MessageBoxA
CopyImage
PostMessageA
EndPaint
FillRect
BeginPaint
IsDlgButtonChecked
EndDialog
LoadStringA
CharNextA
gdi32
GetTextMetricsA
GetTextExtentPointA
CreateFontW
CreateCompatibleDC
SelectObject
BitBlt
RestoreDC
DeleteDC
SetBkMode
SetTextColor
SetBrushOrgEx
GetObjectA
CreateFontIndirectA
CreatePatternBrush
DeleteObject
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
shell32
ShellExecuteA
ole32
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
wininet
InternetCloseHandle
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
HttpAddRequestHeadersA
comctl32
InitCommonControlsEx
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ